Current ThreatQ Version Filter
 

CrowdStrike Insight EDR CDF

The web format of this guide reflects the most current release.  Guides for older iterations are available in PDF format.  

Integration Details

ThreatQuotient provides the following details for this integration:

Introduction

The CrowdStrike Insight EDR CDF for ThreatQ gives analysts the ability to ingest detection incidents from CrowdStrike.

The integration provides the following feeds:

  • CrowdStrike Insight EDR - Detections - brings in aggregated detections, along with their behavioral events and related IOCs, into ThreatQ.
    • Get Detections by IDs (supplemental) - fetches the full details for a given set of detection IDs.
  • CrowdStrike Insight EDR - Hosts -  feeds brings in aggregated detections into ThreatQ.
    • Get Host by IDs (supplemental) - fetches the full details for a given host IDs.

The following object types are ingested from the feeds above:

  • Assets
  • Attack Patterns
  • Events
  • Incidents
  • Indicators
    • Filename
    • File Path
    • IP Address
    • Username
    • MD5
    • SHA-256
    • FQDN
    • Registry Key

Prerequisites

The following is required to install and use the integration:

CrowdStrike API Client Configuration

Users are required to create a properly scoped API Client within CrowdStrike's platform in order use the operation. API Clients can be created and configured via the API Clients and Keys page under Support.

The CrowdStrike Insight EDR CDF requires the following scope permission:

  • Hosts - Read permission required.
    Hosts Scope - Read

Installation

Perform the following steps to install the integration:

The same steps can be used to upgrade the integration to a new version.

  1. Log into https://marketplace.threatq.com/.
  2. Locate and download the integration file.
  3. Navigate to the integrations management page on your ThreatQ instance.
  4. Click on the Add New Integration button.
  5. Upload the yaml file using one of the following methods:
    • Drag and drop the file into the dialog box
    • Select Click to Browse to locate the integration file on your local machine
  6. Select the individual feeds to install, when prompted, and then click Install.  

    ThreatQ will inform you if the feed already exists on the platform and will require user confirmation before proceeding. ThreatQ will also inform you if the new version of the feed contains changes to the user configuration. The new user configurations will overwrite the existing ones for the feed and will require user confirmation before proceeding.

The feed(s) will be added to the integrations page. You will still need to configure and then enable the feed(s).

Configuration

ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.

To configure the integration:

  1. Navigate to your integrations management page in ThreatQ.
  2. Select the Commercial option from the Category dropdown (optional).

    If you are installing the integration for the first time, it will be located under the Disabled tab.

  3. Click on the integration entry to open its details page.
  4. Enter the following parameters under the Configuration tab:

    CrowdStrike Insight EDR - Detections Parameters

    Parameter Description
    API Hostname Select the appropriate CrowdStrike host.  Options include:
    • US-1: api.crowdstrike.com
    • US-2api.us-2.crowdstrike.com (Default)
    • EU-1api.eu-1.crowdstrike.com
    • US-GOV-1api.laggar.gcw.crowdstrike.com
    CrowdStrike Client ID The CrowdStrike Insight EDR API Client ID to authenticate.
    CrowdStrike Client Secret The CrowdStrike Insight EDR API Client Secret to authenticate.
    Enable SSL Certificate Verification Enable this parameter if the feed should validate the host-provided SSL certificate. 
    Disable Proxies Enable this parameter if the feed should not honor proxies set in the ThreatQ UI.
    Confidence Threshold (0-100) The minimum confidence a detection will need to meet to be ingested.  The default setting is 0.
    Severity Threshold (0-100) The minimum severity a detection will need to meet to be ingested.  The default setting is 0.
    Additional Filters (FQL) Enter a FQL query in the field provided to filter the hosts/devices down further.
    Ingested Data Select the data that will be ingested.  Options include:
    • Assets
    • Attack Patterns
    • Events
    • Incidents
    • Indicators

    At least one option must be selected. All options are selected by default.  


    Detections Configuration Screen

    CrowdStrike Insight EDR - Hosts Parameters

    Parameter Description
    API Hostname Select the appropriate CrowdStrike host.  Options include:
    • US-1: api.crowdstrike.com
    • US-2api.us-2.crowdstrike.com (Default)
    • EU-1api.eu-1.crowdstrike.com
    • US-GOV-1api.laggar.gcw.crowdstrike.com
    CrowdStrike Client ID The CrowdStrike Insight EDR API Client ID to authenticate.
    CrowdStrike Client Secret The CrowdStrike Insight EDR API Client Secret to authenticate.
    Enable SSL Certificate Verification Enable this parameter if the feed should validate the host-provided SSL certificate. 
    Disable Proxies Enable this parameter if the feed should not honor proxies set in the ThreatQ UI.
    Additional Filters (FQL) Enter a FQL query in the field provided to filter the hosts/devices down further.

    Hosts Configuration Screen
  5. Review any additional settings, make any changes if needed, and click on Save.
  6. Click on the toggle switch, located above the Additional Information section, to enable it.

ThreatQ Mapping

ThreatQuotient provides the following mapping for the CrowdStrike Insight EDR CDF.  

CrowdStrike Insight EDR - Detections

CrowdStrike Insight EDR - Detections and Get Detections by IDs (Supplemental) feeds brings in aggregated detections, along with their behavioral events and related IOCs, into ThreatQ.

This feed retrieves the .resources[] key which is further on used in the Get Detections by IDs (Supplemental) supplemental feed call in order to fetch the rest of data.

GET https://{HOST}/alerts/queries/alerts/v2

Sample Response

{
    "meta": {
        "query_time": 0.016082104,
        "pagination": {
            "offset": 0,
            "limit": 100,
            "total": 3065
        },
        "powered_by": "msa-api",
        "trace_id": "e0f6d630-1558-42d9-86df-d495d9b7e535"
    },
    "resources": [
        "ldt:4c3db6145a704a179a6dacd924f6e8cc:73697616107",
        "ldt:4c3db6145a704a179a6dacd924f6e8cc:73695566300",
        "ldt:4c3db6145a704a179a6dacd924f6e8cc:73694280199"
    ],
    "errors": []
}

Get Detections by IDs (Supplemental)

The Get Detections by IDs supplemental feed fetches the full details for a given set of detection IDs.

POST https://{HOST}/alerts/entities/alerts/v2

Sample Response

{
    "meta": {
        "query_time": 0.016374054,
        "powered_by": "msa-api",
        "trace_id": "08a7c526-0fcc-44c0-bf8d-368b3a661cd7"
    },
    "resources": [
        {
            "cid": "e5d4a79a091448bfb80afc724b3cf952",
            "created_timestamp": "2021-08-31T00:20:57.828992776Z",
            "detection_id": "ldt:4c3db6145a704a179a6dacd924f6e8cc:73693643274",
            "device": {
                "device_id": "4c3db6145a704a179a6dacd924f6e8cc",
                "cid": "e5d4a79a091448bfb80afc724b3cf952",
                "agent_load_flags": "0",
                "agent_local_time": "2021-08-12T12:08:19.328Z",
                "agent_version": "6.27.14105.0",
                "bios_manufacturer": "Xen",
                "bios_version": "4.2.amazon",
                "config_id_base": "65994753",
                "config_id_build": "14105",
                "config_id_platform": "3",
                "external_ip": "54.89.138.42",
                "hostname": "WIN10DETECTION",
                "first_seen": "2021-02-09T16:06:00Z",
                "last_seen": "2021-08-31T00:08:11Z",
                "local_ip": "172.17.0.31",
                "mac_address": "02-7d-30-2b-bc-f7",
                "machine_domain": "csanfr.local",
                "major_version": "10",
                "minor_version": "0",
                "os_version": "Windows 10",
                "platform_id": "0",
                "platform_name": "Windows",
                "product_type": "1",
                "product_type_desc": "Workstation",
                "site_name": "Default-First-Site-Name",
                "status": "normal",
                "system_manufacturer": "Xen",
                "system_product_name": "HVM domU",
                "groups": [
                    "47582c7801a4431e8d81d85aae570cd4"
                ],
                "modified_timestamp": "2021-08-31T00:10:03Z",
                "instance_id": "i-084e546a6695e1412",
                "service_provider": "AWS_EC2",
                "service_provider_account_id": "390847698897"
            },
            "behaviors": [
                {
                    "device_id": "4c3db6145a704a179a6dacd924f6e8cc",
                    "timestamp": "2021-08-31T00:20:17Z",
                    "behavior_id": "5702",
                    "filename": "runningdiskpartmg16.exe",
                    "filepath": "\\Device\\HarddiskVolume2\\Users\\demo\\Desktop\\Malware\\runningdiskpartmg16.exe",
                    "alleged_filetype": "exe",
                    "cmdline": "c:\\Users\\demo\\Desktop\\Malware\\runningdiskpartmg16.exe -k",
                    "scenario": "NGAV",
                    "objective": "Falcon Detection Method",
                    "tactic": "Machine Learning",
                    "tactic_id": "CSTA0004",
                    "technique": "Sensor-based ML",
                    "technique_id": "CST0007",
                    "display_name": "",
                    "description": "This file meets the machine learning-based on-sensor AV protection's high confidence threshold for malicious files.",
                    "severity": 70,
                    "confidence": 70,
                    "ioc_type": "hash_sha256",
                    "ioc_value": "4d4b17ddbcf4ce397f76cf0a2e230c9d513b23065f746a5ee2de74f447be39b9",
                    "ioc_source": "library_load",
                    "ioc_description": "\\Device\\HarddiskVolume2\\Users\\demo\\Desktop\\Malware\\runningdiskpartmg16.exe",
                    "user_name": "WIN10DETECTION$",
                    "user_id": "S-1-5-18",
                    "control_graph_id": "ctg:4c3db6145a704a179a6dacd924f6e8cc:73693643274",
                    "triggering_process_graph_id": "pid:4c3db6145a704a179a6dacd924f6e8cc:656468848626",
                    "sha256": "4d4b17ddbcf4ce397f76cf0a2e230c9d513b23065f746a5ee2de74f447be39b9",
                    "md5": "d1c27ee7ce18675974edf42d4eea25c6",
                    "parent_details": {
                        "parent_sha256": "9077b1aa0afb8db329fded0e51085de1c51b22a986162f29037fca404a80d512",
                        "parent_md5": "",
                        "parent_cmdline": "C:\\Windows\\system32\\services.exe",
                        "parent_process_graph_id": "pid:4c3db6145a704a179a6dacd924f6e8cc:476751454426"
                    },
                    "pattern_disposition": 2304,
                    "pattern_disposition_details": {
                        "indicator": false,
                        "detect": false,
                        "inddet_mask": false,
                        "sensor_only": false,
                        "rooting": false,
                        "kill_process": false,
                        "kill_subprocess": false,
                        "quarantine_machine": false,
                        "quarantine_file": false,
                        "policy_disabled": true,
                        "kill_parent": false,
                        "operation_blocked": false,
                        "process_blocked": true,
                        "registry_operation_blocked": false,
                        "critical_process_disabled": false,
                        "bootup_safeguard_enabled": false,
                        "fs_operation_blocked": false,
                        "handle_operation_downgraded": false,
                        "kill_action_failed": false,
                        "blocking_unsupported_or_disabled": false,
                        "suspend_process": false,
                        "suspend_parent": false
                    }
                }
            ],
            "email_sent": true,
            "first_behavior": "2021-08-31T00:20:17Z",
            "last_behavior": "2021-08-31T00:20:18Z",
            "max_confidence": 70,
            "max_severity": 70,
            "max_severity_displayname": "High",
            "show_in_ui": true,
            "status": "new",
            "hostinfo": {
                "domain": ""
            },
            "seconds_to_triaged": 0,
            "seconds_to_resolved": 0,
            "behaviors_processed": [
                "pid:4c3db6145a704a179a6dacd924f6e8cc:656471670052:5702",
                "pid:4c3db6145a704a179a6dacd924f6e8cc:656474610435:5702",
                "pid:4c3db6145a704a179a6dacd924f6e8cc:656470648952:5702",
                "pid:4c3db6145a704a179a6dacd924f6e8cc:656469680329:5702",
                "pid:4c3db6145a704a179a6dacd924f6e8cc:656468848626:5702"
            ]
        }
    ],
    "errors": []
}

ThreatQuotient provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.resources[].device.
machine_domain + '\' + .resources[].device.
hostname + ' (' + data.device.local_ip + ')'
Related Asset.
Value
N/A .resources[].
device.
first_seen
csanfr.local\WIN10D
ETECTION (172.17.0.31)
Will be ingested if the Assets user_field is checked.
.resources[].device.
local_ip
Related Asset.Attribute IP Address .resources[]
.device.
first_seen
172.17.0.31 N/A
.resources[].device.
hostname
Related Asset.Attribute Hostname .resources[].
device.
first_seen
WIN10DETECTION N/A
.resources[].device.
external_ip
Related Asset.Attribute External IP Address .resources[].
device.
first_seen
54.89.138.42 N/A
.resources[].device.
device_id
Related Asset.Attribute CrowdStrike Device ID .resources[].
device.
first_seen
4c3db6145a704a179
a6dacd924f6e8cc
N/A
.resources[].device.
os_version
Related Asset.Attribute Operating System .resources[].
device.
first_seen
Windows 10 N/A
.resources[].device.
product_type_desc
Related Asset.Attribute Product Type .resources[].
device.
first_seen
Workstation N/A
.resources[].device.
site_name
Related Asset.Attribute Site Name .resources[]
.device.
first_seen
Default-First-Site-Name N/A
.resources[].device.
status
Related Asset.Attribute Status .resources[].
device.
first_seen
normal Updatable
.resources[].device.
service_provider
Related Asset.Attribute Service Provider .resources[].
device.
first_seen
AWS_EC2 N/A
.resources[].device.
detection_
suppression_status
Related Asset.Attribute Detection Suppression Status .resources[].
device.
first_seen
unsuppressed Updatable
.resources[].device.
host_hidden_status
Related Asset.Attribute Hidden Status .resources[].
device.
first_seen
visible Updatable
.resources[].device.
ou
Related Asset.Attribute Organizational Unit .resources[].
device.
first_seen
Domain Controllers N/A
.resources[].device.
rfm_state
Related Asset.Attribute Reduced Functionality Mode .resources[].
device.
first_seen
True Converted to string. Updatable
.resources[].device.
provision_state
Related Asset.Attribute Provision Status .resources[].
device.
first_seen
True Converted to string. Updatable
.resources[].device.
zone_group
Related Asset.Attribute Zone Group .resources[].
device.
first_seen
us-east-1a N/A
.resources[].filename Related Indicator.Value Filename .resources[].
created_
timestamp
runningdiskpartmg16
.exe
The status of the indicator is Indirect. Will be ingested if the Indicators user_field is checked.
.resources[].filepath Related Indicator.Value File Path .resources[].
created_
timestamp
\Device\HarddiskVolum
e2\Users\demo\Deskto
p\Malware\runningdisk
partmg16.exe
The status of the indicator is Indirect. Will be ingested if the Indicators user_field is checked.
.resources[].user_
name
Related Indicator.Value Username .resources[].
created_
timestamp
dstyres The status of the indicator is Indirect. Will be ingested if the Indicators user_field is checked.
.resources[].md5 Related Indicator.Value MD5 .resources[].
created_
timestamp
d1c27ee7ce18675974ed
f42d4eea25c6
The status of the indicator is Indirect. Will be ingested if the Indicators user_field is checked.
.resources[].sha256 Related Indicator.Value SHA-256 .resources[].
created_
timestamp
4d4b17ddbcf4ce397f76cf
0a2e230c9d513b23065f7
46a5ee2de74f447be39b9
The status of the indicator is Indirect. Will be ingested if the Indicators user_field is checked.
.resources[].alleged_
filetype
Related Indicator/Related Event.Attribute Alleged File Type .resources[].
created_
timestamp
exe Added to .md5, .sha256 and .ioc_value
.resources[].confidence Related Indicator/Related Event.Attribute Confidence .resources[].
created_
timestamp
70 Added to .md5, .sha256 and .ioc_value. Updatable
.resources[].severity Related Indicator/Related Event.Attribute Severity .resources[].
created_
timestamp
70 Added to .md5, .sha256 and .ioc_value. Updatable
.resources[].ioc_type Related Indicator.Type N/A .resources[].
created_
timestamp
SHA-256 Mapped by using the detection table below
.resources[].ioc_value Related Indicator.Value N/A .resources[].
created_
timestamp
4d4b17ddbcf4ce397f76cf0
a2e230c9d513b23065f746
a5ee2de74f447be39b9
Will be ingested if the Indicators user_field is checked.
.resources[].ioc_
description
Related Indicator.
Description
N/A .resources[].
created_
timestamp
\Device\HarddiskVolume2\
Users\demo\Desktop\Mal
ware\runningdiskpartmg16
.exe
N/A
.resources[].ioc_source Related Indicator
Attribute
IOC Source .resources[].
created_
timestamp
library_load N/A
'CrowdStrike Detection: ' + .resources[].
aggregate_id
Incident.Value N/A .resources[].
created_
timestamp
Severity Detection on WIN10DETECTION - ldt:4c3db6145a704a
179a6dacd924f6e8cc:736
93643276
Will be ingested if the Incidents user_field is checked.
.resources[].incident.
start
Incident.Started_at N/A N/A 2021-08-22T18:30:03Z N/A
.resources[].incident.
end
Incident.Ended_at N/A N/A 2021-08-22T18:30:03Z N/A
.resources[].email_
sent
Incident.Attribute Email Sent .resources[].
created_
timestamp
True Converted to string.
.resources[].aggregate
_id
Incident.Attribute CrowdStrike Aggregate ID .resources[].
created_
timestamp
ldt:4c3db6145a704a17
9a6dacd924f6e8cc:736
19780939
N/A
.resources[].status Incident.Attribute Status .resources[].
created_
timestamp
new Updatable
.resources[].seconds_
to_resolved
Incident.Attribute Seconds to Resolved .resources[].
created_
timestamp
0 If value is not 0. Updatable
.resources[].seconds_
to_triaged
Incident.Attribute Seconds to Triaged .resources[].
created_
timestamp
70 If value is not 0. Updatable
.resources[].technique
_id + ' - ' + .resources[].technique
Related Attack Pattern.Value N/A N/A CST0017 - Sensor-based ML If .resources[].technique_id is a known Mitre Attack, the already existing attack pattern is linked to the objects. The object will be ingested/linked if the Attack Patterns user_field is checked.
.resources[].tactic Related Attack Pattern.Attribute Tactic .resources[].
created_
timestamp
Machine Learning The attribute is added only to new attack patterns
.resources[].scenario + ':' + .resources[].name + ' on ' + .resources[].device.
hostname
Related Event.Title N/A .resources[].
timestamp
Ngav: SpearPhishExecutable
Stack on WIN10DETECTION
Will be ingested if the Events user_field is checked. The Event Type is Detection
.resources[].description Related Event.Description N/A .resources[].
created_
timestamp
This file meets the machine learning-based on-sensor AV protection's high confidence threshold for malicious files. N/A
.resources[].display_
name
Related Event.Attribute Behavior .resources[].
created_
timestamp
machine learning N/A
.resources[].ioc_source Related Event.Attribute IOC Source .resources[].
created_
timestamp
library_load N/A
.resources[].objective Related Event.Attribute Behavior Objective .resources[].
created_
timestamp
Falcon Detection Method N/A

CrowdStrike Detection Type Mapping

The CrowdStrike Detection Type (as found in .resources[].behaviors[].ioc_type in the Get Detections by IDs Supplemental feed) to ThreatQ Type mapping is as follows:

Crowdstrike Indicator Type ThreatQ Indicator Type
domain FQDN
filename Filename
hash_md5 MD5
hash_sha256 SHA-256
registry_key Registry Key

CrowdStrike Insight EDR - Hosts

CrowdStrike Insight EDR - Hosts and Get Host by IDs (Supplemental) feeds brings in aggregated detections into ThreatQ.

The CrowdStrike Insight EDR - Hosts feed retrieves the .resources[] key which is further on used in the Get Host by IDs (Supplemental) supplemental feed call in order to fetch the details.

GET https://{HOST}/detects/entities/summaries/GET/v1

{
    "meta": {
        "query_time": 0.016082104,
        "pagination": {
            "offset": 0,
            "limit": 100,
            "total": 3065
        },
        "powered_by": "msa-api",
        "trace_id": "e0f6d630-1558-42d9-86df-d495d9b7e535"
    },
    "resources": [
        "0b5abb999c1544f1af71983753ff8d22",
        "3eb0e8e03d1245eaa643046f84bc51f8",
        "3fd9b8a8a7ba426a9bf3aaa2ddfc5b02"
    ],
    "errors": []
}

Get Host by IDs (Supplemental)

The Get Host by IDs supplemental feed fetches the full details for a given host IDs.

POST https://{HOST}/devices/entities/devices/v2

Sample Response

{
  "meta": {
    "query_time": 0.005269768,
    "powered_by": "device-api",
    "trace_id": "d04ebb63-4aab-48ec-a7bc-5495bc6f0f03"
  },
  "resources": [
    {
      "device_id": "3fd9b8a8a7ba426a9bf3aaa2ddfc5b02",
      "cid": "e5d4a79a091448bfb80afc724b3cf952",
      "agent_load_flags": "0",
      "agent_local_time": "2021-10-21T22:05:09.512Z",
      "agent_version": "6.30.14406.0",
      "bios_manufacturer": "American Megatrends Inc.",
      "bios_version": "090008 ",
      "build_number": "19042",
      "config_id_base": "65994753",
      "config_id_build": "14406",
      "config_id_platform": "3",
      "cpu_signature": "329303",
      "external_ip": "20.58.113.63",
      "mac_address": "00-22-48-00-63-1f",
      "instance_id": "3c4c3d6f-fa6d-44d3-8a29-1e7d16ce5dfd",
      "service_provider": "AZURE",
      "service_provider_account_id": "ec5c2f3b-9a85-498b-b609-e81a8e6e2cbd",
      "hostname": "SENTINEL-C-02",
      "first_seen": "2021-06-01T07:48:08Z",
      "last_seen": "2021-10-26T10:11:57Z",
      "local_ip": "172.18.0.9",
      "machine_domain": "illusive-sacumen.com",
      "major_version": "10",
      "minor_version": "0",
      "os_version": "Windows 10",
      "os_build": "19042",
      "ou": [],
      "platform_id": "0",
      "platform_name": "Windows",
      "policies": [
        {
          "policy_type": "prevention",
          "policy_id": "fcde00f4eef9466c8578f2dc587b437a",
          "applied": true,
          "settings_hash": "adc849a6",
          "assigned_date": "2021-09-02T00:14:29.894848191Z",
          "applied_date": "2021-09-02T00:16:03.578241038Z",
          "rule_groups": []
        }
      ],
      "reduced_functionality_mode": "no",
      "device_policies": {
        "prevention": {
          "policy_type": "prevention",
          "policy_id": "fcde00f4eef9466c8578f2dc587b437a",
          "applied": true,
          "settings_hash": "adc849a6",
          "assigned_date": "2021-09-02T00:14:29.894848191Z",
          "applied_date": "2021-09-02T00:16:03.578241038Z",
          "rule_groups": []
        },
        "sensor_update": {
          "policy_type": "sensor-update",
          "policy_id": "5b568dec090c480b808830586c134441",
          "applied": true,
          "settings_hash": "65994753|3|2|automatic;101",
          "assigned_date": "2021-10-21T22:03:38.322395302Z",
          "applied_date": "2021-10-21T22:06:51.608393214Z",
          "uninstall_protection": "ENABLED"
        },
        "device_control": {
          "policy_type": "device-control",
          "policy_id": "25d6ae9765624a0b9c1ec577836a8925",
          "applied": true,
          "assigned_date": "2021-10-21T00:51:26.169208737Z",
          "applied_date": "2021-10-21T00:56:09.944670879Z"
        },
        "global_config": {
          "policy_type": "globalconfig",
          "policy_id": "dc483372e2474e2fb5efc99a49a80fc1",
          "applied": true,
          "settings_hash": "c6c03d6",
          "assigned_date": "2021-10-21T22:06:57.220323195Z",
          "applied_date": "2021-10-21T22:08:24.58680563Z"
        },
        "remote_response": {
          "policy_type": "remote-response",
          "policy_id": "ab8edf33dd1e4a178eac44f2b4fc2c25",
          "applied": true,
          "settings_hash": "f472bd8e",
          "assigned_date": "2021-06-01T07:49:34.07955937Z",
          "applied_date": "2021-06-01T07:49:53.428657794Z"
        },
        "firewall": {
          "policy_type": "firewall",
          "policy_id": "b07aa203e1b24a1581b5403390746a36",
          "applied": true,
          "assigned_date": "2021-10-21T00:51:26.169225468Z",
          "applied_date": "2021-10-21T00:56:10.455799263Z",
          "rule_set_id": "b07aa203e1b24a1581b5403390746a36"
        }
      },
      "groups": [],
      "group_hash": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
      "product_type": "1",
      "product_type_desc": "Workstation",
      "provision_status": "Provisioned",
      "serial_number": "0000-0004-3449-1529-1657-8152-51",
      "service_pack_major": "0",
      "service_pack_minor": "0",
      "pointer_size": "8",
      "site_name": "Default-First-Site-Name",
      "status": "contained",
      "system_manufacturer": "Microsoft Corporation",
      "system_product_name": "Virtual Machine",
      "tags": [],
      "modified_timestamp": "2021-10-26T10:12:02Z",
      "slow_changing_modified_timestamp": "2021-10-26T10:05:23Z",
      "meta": {
        "version": "11755"
      },
      "zone_group": "Sentinel"
    }
  ],
  "errors": []
}

ThreatQuotient provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
.resources[].machine_domain + '' + .resources[].hostname + '(' + .resources[].local_ip + ')' Asset.Value N/A .resources[].first_seen illusive-sacumen.com\
SENTINEL-C-02 (172.18.0.9)
N/A
.resources[].local_ip Asset.Attribute IP Address .resources[].first_seen 172.17.0.31 N/A
.resources[].hostname Asset.Attribute Hostname .resources[].first_seen WIN10DETECTION N/A
.resources[].external_ip Asset.Attribute External IP Address .resources[].first_seen 54.89.138.42 N/A
.resources[]_id Asset.Attribute CrowdStrike Device ID .resources[].first_seen 4c3db6145a704a179
a6dacd924f6e8cc
N/A
.resources[].os_version Asset.Attribute Operating System .resources[].first_seen Windows 10 N/A
.resources[].product_type_desc Asset.Attribute Product Type .resources[].first_seen Workstation N/A
.resources[].site_name Asset.Attribute Site Name .resources[].first_seen Default-First-Site-Name N/A
.resources[].status Asset.Attribute Status .resources[].first_seen normal Updatable
.resources[].detection_suppression_status Asset.Attribute Detection Suppression Status .resources[].first_seen unsuppressed Updatable
.resources[].service_provider Asset.Attribute Service Provider .resources[].first_seen AWS_EC2 N/A
.resources[].host_hidden_status Asset.Attribute Host Hidden Status .resources[].first_seen visible Updatable
.resources[].ou Asset.Attribute Organizational Unit .resources[].first_seen Domain Controllers N/A
.resources[].rfm_state Asset.Attribute Reduced Functionality Mode .resources[].first_seen True Updatable
.resources[].provision_state Asset.Attribute Provision Status .resources[].first_seen True Updatable
.resources[].zone_group Asset.Attribute Zone Group .resources[].first_seen us-east-1a N/A
.resources[].tags[] Asset.Tag N/A N/A FalconGroupingTags/testtag N/A
           

Average Feed Run

Object counts and Feed runtime are supplied as generalities only - objects returned by a provider can differ based on credential configurations and Feed runtime may vary based on system resources and load.

CrowdStrike Insight EDR - Detections

Metric Result
Run Time 1 minute
Assets 1
Asset Attributes 9
Attack Patterns 4
Attack Pattern Attributes 3
Events 2
Event Attributes 10
Incidents 1
Incident Attributes 9
Indicators 9
Indicator Attributes 14

CrowdStrike Insight EDR - Hosts

Metric Result
Run Time 1 minute
Assets 3
Asset Attributes 41

Known Issues / Limitations

  • As of the release of version 1.0.3, Host Groups cannot be customized.  All indicators will be applied globally.  

Change Log

  • Version 1.1.2
    • Updated the CrowdStrike Insight EDR – Detections feed to utilize the Alerts v2 API endpoint.
    • Added the following new configuration parameters for all feeds:
      • Enable SSL Certificate Verification - enable or disable verification of the server's SSL certificate. 
      • Disable Proxies - determine if the feed should honor proxy settings set in the ThreatQ UI.
    • Added update rules for select attributes.
    • Updated the minimum ThreatQ version to 5.12.0. 
  • Version 1.1.1 rev-a
    • Guide Update - added a section, CrowdStrike Client API Configuration, to the Prerequisites section of the guide.  
  • Version 1.1.1
    • Removed the CrowdStrike Insight EDR - IOC Export feed as it has now been incorporated into the CrowdStrike Insight EDR Action Bundle integration.  
  • Version 1.1.0
    • CrowdStrike Insight EDR - IOC Export - Added the following new configuration options:
      • Policy for MD5, SHA256 Indicators
      • Policy for Domain, ipv4, ipv6 Indicators 
  • Version 1.0.5
    • Updated the Get Host by IDs supplemental feed endpoint to v2.
  • Version 1.0.4
    • Added check to CrowdStrike Insight EDR - IOC Export in order to verify if indicators already exist in CrowdStrike. Trying to add an existing one will throw an error and will stop any of the indicators from being added.
  • Version 1.0.3
    • Updated the CrowdStrike Insight EDR - IOC Export endpoint's URL and body.  
    • Added Default Platform configuration parameter.
    • Removed the Policy Type configuration parameter.  
  • Version 1.0.2 rev-a
    • Updated Custom Object installation steps in the Prerequisites chapter.  
  • Version 1.0.2
    • Fixed an issue where custom object files were missing from the integration download.  Updated documentation with steps to install the Asset custom object - see the Prerequisites chapter.  
    • Added an Attack Pattern object from Behavior Techniques data in CrowdStrike Insight EDR - Detections Feed.
    • Removed Behavior Technique and Behavior Tactic attributes.
    • Removed the Ingest Behavior Events option from the  CrowdStrike Insight EDR - Detections feed configuration.
    • Users can now select what data will be ingested in ThreatQ by selecting the appropriate option(s) in CrowdStrike Insight EDR - Detections feed configuration.
  • Version 1.0.1
    • Added a new API Host configuration parameter that will allow you to select a CrowdStrike host.  See step 4 in the Configuration chapter for more information.  
  • Version 1.0.0
    • Initial release